Evasive Panda Cyber Attacks: Threat Actor Targets Tibetans

Cybersecurity experts at ESET have come across a malicious campaign that targets Tibetans in many countries by leveraging the website of a religious gathering. Evasive Panda cyber attacks are associated with a ...
software supply chain malware

VirusTotal: Generative AI is Great at Detecting, Identifying Malware

Generative AI engines similar to OpenAI’s ChatGPT and Google’s Bard will become indispensable tools for enterprises and cybersecurity operations in detecting and analyzing malicious code in a real-world environment, according to researchers ...
Security Boulevard
identity cyberattacks ransomware

Assessing Content Management System Security

As more businesses turn paperless and strive for more efficiency, content management systems become more and more popular. But having all your sensitive information in one place can be a risk. The ...
Security Boulevard
Automox open source M&A

Automate Software Security Checks to Find Open Source Software, SDK Perils

The reusability and convenient utility of open source software (OSS) and software development kits (SDKs) has been a boon to mobile application developers. Both types of software shortcuts help developers save time ...
Security Boulevard
Protect WordPress Websites from SQL Injection

How to Protect WordPress Websites from SQL Injection

If you are one of the many who are using WordPress as a content management system (CMS) for your website, it’s important to be aware of SQL injection threats that could take ...
Security Boulevard
IAST Integrate SAST Tools with DevSecOps

5 Steps to Integrate SAST Tools with DevSecOps

Static application security testing, or SAST, is the process to test the source code to find any security defect in the code or its vulnerabilities. In the application security assurance program, SAST ...
Security Boulevard
Bank accounts hacked for over 1 million dollars

Bank accounts hacked for over 1 million dollars

Last month, a British bank and its customers were hit by a coordinated and targeted attack by criminals that launched their efforts from Eastern Eu rope. In an impressive display of a ...